Foundations for the study of software architecture
ACM SIGSOFT Software Engineering Notes
Architectural mismatch or why it's hard to build systems out of existing parts
Proceedings of the 17th international conference on Software engineering
Software architecture: perspectives on an emerging discipline
Software architecture: perspectives on an emerging discipline
Security in computing
Towards a taxonomy of architecture integration strategies
ISAW '98 Proceedings of the third international workshop on Software architecture
Software engineering for security: a roadmap
Proceedings of the Conference on The Future of Software Engineering
A framework for building non-functional software architectures
Proceedings of the 2001 ACM symposium on Applied computing
A notation for problematic architecture interactions
Proceedings of the 8th European software engineering conference held jointly with 9th ACM SIGSOFT international symposium on Foundations of software engineering
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
The impact of component architectures on interoperability
Journal of Systems and Software
Merging Integration Solutions for Architecture and Security Mismatch
ICCBSS '02 Proceedings of the First International Conference on COTS-Based Software Systems
Security Characterisation and Integrity Assurance for
SMT '00 Proceedings of the International Conference on software Methods and Tools (SMT'00)
A Compositional Approach for Constructing Connectors
WICSA '01 Proceedings of the Working IEEE/IFIP Conference on Software Architecture
Composing heterogeneous software architectures
Composing heterogeneous software architectures
Web Services-Based Security Requirement Elicitation
IEICE - Transactions on Information and Systems
Hi-index | 0.00 |
Security has become a paramount concern due to dramatic advances of network technologies and a wide variety of new business opportunities. These advances have also brought the need for integration of computers systems to the surface, mainly for real-time, information sharing. As these systems are network-based, COTS products are predominantly used in these types of integration efforts. Since security is still a relatively new concern, it is often addressed as an afterthought in software development. Unfortunately, to ensure a high degree of security, it is imperative to address the concerns in a principled manner. Software architectures provide a unique opportunity to assess and structure the security as part of integration solution design. In this paper, we describe an approach to constructing secure integration architectures-- architectural solutions to component interoperability that both satisfy known functional security policies and that specify the functionality of security mechanisms used to fulfill them.